General
-
Target
926ad2d71e44aa415059e611b53f77.apk
-
Size
21.2MB
-
Sample
220705-bq7fdscfhn
-
MD5
95926ad2d71e44aa415059e611b53f77
-
SHA1
ed76e854a87f4380e6af68d5e7a3a38fc9b2545f
-
SHA256
98dd273114004514b32dd570e9011b6d6437e36f8ac6294ed38e4287037ddbbe
-
SHA512
e231659b4287a0bf9298e17e9bb07ca132697c97ca212af0bb9bcaf516ceb3a863f0acb78ae90361cd70794d7238d260a77eb93ff2382d267afa78037e57f755
Static task
static1
Behavioral task
behavioral1
Sample
926ad2d71e44aa415059e611b53f77.apk
Resource
android-x86-arm-20220621-en
Malware Config
Targets
-
-
Target
926ad2d71e44aa415059e611b53f77.apk
-
Size
21.2MB
-
MD5
95926ad2d71e44aa415059e611b53f77
-
SHA1
ed76e854a87f4380e6af68d5e7a3a38fc9b2545f
-
SHA256
98dd273114004514b32dd570e9011b6d6437e36f8ac6294ed38e4287037ddbbe
-
SHA512
e231659b4287a0bf9298e17e9bb07ca132697c97ca212af0bb9bcaf516ceb3a863f0acb78ae90361cd70794d7238d260a77eb93ff2382d267afa78037e57f755
Score10/10-
Detected phishing page
-
Checks Android system properties for emulator presence.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-